Microsoft's Enhanced Mitigation Experience Toolkit (EMET), a security program popular with companies, was updated Monday to harden the exploit mitigations that it adds to other programs and to address compatibility issues with some of them.

Like most EMET mitigations, EAF+ is a set of safeguards and checks designed to block the execution of arbitrary code when memory corruption vulnerabilities are exploited. It was first added in EMET 5.0, released in July.

In addition to addressing the compatibility issues, EMET 5.1 also improves and hardens existing mitigations "to make them more resilient to attacks and bypasses," the EMET team said in a blog post Monday.

It's particularly important for users of Internet Explorer 11 on Windows 7 or Windows 8.1 to install the new version because the browser security patches scheduled to be released today are known to cause compatibility issues with EAF+.

EMET 5.1 also adds a new "local telemetry" feature that allows users to save memory dumps whenever an EMET mitigation is triggered. These memory dumps can later be analyzed to determine what triggered the mitigations, whether it was a malicious exploit or something else.

EMET is popular within enterprises environments because it allows companies to protect their end-point systems from software exploits even before the targeted vulnerabilities are patched. The tool can enforce memory protections like Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR) and 12 others on running programs that lack them by default.

It can also enforce pre-defined SSL certificate pinning rules in Internet Explorer. These rules can prevent man-in-the-middle attacks that use digital certificates for popular websites that are technically valid, but were illegally obtained -- for example, by compromising a certificate authority.

Copyright 2016 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.